CVE-2011-0018

OpenVAS Manager <2.0rc2 - Command Injection

Title source: llm
STIX 2.1

Description

The email function in manage_sql.c in OpenVAS Manager 1.0.x through 1.0.3 and 2.0.x through 2.0rc2 allows remote authenticated users to execute arbitrary commands via the (1) To or (2) From e-mail address in an OMP request to the Greenbone Security Assistant (GSA).

Exploits (1)

exploitdb WRITEUP VERIFIED
by Tim Brown · textlocallinux
https://www.exploit-db.com/exploits/16086

References (8)

Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/45987
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/515971/100/0/threaded
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/43037
Exploit, Patch, Vendor Advisory x_refsource_confirm
http://www.openvas.org/OVSA20110118.html
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0208
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/70639
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/16086
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/65011

Scores

EPSS 0.1169
EPSS Percentile 93.7%

Details

CWE
CWE-20
Status published
Products (5)
openvas/openvas_manager 1.0.0 (9 CPE variants)
openvas/openvas_manager 1.0.1
openvas/openvas_manager 1.0.2
openvas/openvas_manager 1.0.3
openvas/openvas_manager 2.0 beta1 (5 CPE variants)
Published Jan 28, 2011
Tracked Since Feb 18, 2026